An analytical evaluation of network security modelling techniques applied to manage threats
Abstract
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.Citation
Viduto, V.; Maple, C.; Huang, W.; (2010) "An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats," Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on , pp.117-123, 4-6 Nov. 2010Type
Conference papers, meetings and proceedingsLanguage
enISBN
9780769542362ae974a485f413a2113503eed53cd6c53
10.1109/BWCCA.2010.58